Results 41 to 50 of about 240,934 (135)

Arguing satisfaction of security requirements [PDF]

open access: yes, 2006
This chapter presents a process for security requirements elicitation and analysis, based around the construction of a satisfaction argument for the security of a system. The process starts with the enumeration of security goals based on assets in the
Haley, Charles B.   +3 more
core  

Introduction to Security Onion [PDF]

open access: yes, 2016
Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis.
Heenan, Ross, Moradpoor, Naghmeh
core  

Asymptotic Methods for Asset Market Equilibrium Analysis [PDF]

open access: yes
General equilibrium analysis is difficult when asset markets are incomplete. We make the simplifying assumption that uncertainty is small and use bifurcation methods to compute Taylor series approximations for asset demand and asset market equilibrium. A
Kenneth L. Judd, Sy-Ming Guu
core  

Hybrid cryptographic and AI frameworks for cheat detection in online games

open access: yesDiscover Artificial Intelligence
The exponential growth of multiplayer gaming has led to the formation of an arms race between anticheat and cheat developers, which has been increasing in pace at an exponential rate, creating a need for the implementation of robust anti-cheat mechanisms
Sitanshu Kapur   +4 more
doaj   +1 more source

Towards Security Requirements in Online Summative Assessments

open access: yes, 2009
Confidentiality, integrity and availability (C-I-A) are the security requirements fundamental to any computer system. Similarly, the hardware, software and data are important critical assets.
Apampa, K.M, Argles, D, Wills, G.B
core  

A proposed case for the cloud software engineering in security [PDF]

open access: yes, 2014
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core  

The Game of Credit: A High Stakes Game That Perpetuates the Racial Wealth Gap [PDF]

open access: yes, 2014
Everyone deserves the opportunity to build a financially secure future for themselves and their families. Access to equal opportunities is the cornerstone of America's core values and is also a necessity to growing a healthy economy.
Lindy Carrow
core  

Building Wealth on the Foundation of Employment Portfolio Series [PDF]

open access: yes, 2007
[Excerpt] The vision of the U.S. Department of Labor (USDOL) is to advance the economic futures of workers, including those with disabilities. The unique mission of the Office of Disability Employment Policy (ODEP) within USDOL is to promote the ...
National Center on Workforce and Disability/Adult
core   +1 more source

Auditoría de gestión de seguridad informática, en entidades públicas y privadas en Loja

open access: yesMaskana, 2017
RESUMEN Este documento exhibe información sobre normas, estándares y metodologías, utilizados para la gestión de seguridad de un Data Center y Red LAN.
Carlos Jaramillo   +5 more
doaj  

The effect of short-selling of the aggregation of information in an experimental asset market [PDF]

open access: yes, 2008
We show by means of a laboratory experiment that the relaxation of short--selling constraints causes the price of both an overvalued and an undervalued asset to decrease.
Veiga, Helena, Vorsatz, Marc
core   +1 more source

Home - About - Disclaimer - Privacy